119 lines
6.9 KiB
Standard ML
119 lines
6.9 KiB
Standard ML
![]() |
Copyright 1983
|
|||
|
NPG,Ltd
|
|||
|
|
|||
|
COPY-PROTECTION
|
|||
|
|
|||
|
ISSUE: Should people who, though not for personal profit, deliberately
|
|||
|
violate copyright restrictions and reproduce copy- protected computer programs
|
|||
|
be treated as criminals? (1) Yes. They are performing criminal acts; the fact
|
|||
|
that they use a computer should have no bearing on their criminality. (2) No.
|
|||
|
When we teach them to be smart with computers it does not make sense to then
|
|||
|
put them in jail.
|
|||
|
|
|||
|
BACKGROUND: As in the case with traditional literary works, a copyright
|
|||
|
gives the authors and publishers of software products (computer programs) the
|
|||
|
legal right to prevent people from freely copying their works. However,
|
|||
|
because they have to be effectively copied every time they are loaded into a
|
|||
|
computer, software products are much easier to copy than paper products such as
|
|||
|
books. Copying a book is a very obvious task and one that requires a long time
|
|||
|
and often involves a substantial copying cost. In contrast, a disk containing
|
|||
|
the same amount of information can be silently and secretly copied in a matter
|
|||
|
of seconds. In cases of deliberately copying programs for resale, few people
|
|||
|
appear inclined to argue that the copiers should not be prosecuted like any
|
|||
|
ordinary criminal. But the situation is not as clear when the person doing the
|
|||
|
copying is doing it for personal use and not reselling the copy. Software
|
|||
|
developers worry that even when not done for profit there is a growing tendency
|
|||
|
to "share" extra copies of programs. To combat this as well as more explicit
|
|||
|
forms of copying software developers incorporate special features in their
|
|||
|
programs to prevent copying, or at least make it more difficult to do so. To
|
|||
|
the dismay of the software developers, the use of every new "copy-protection"
|
|||
|
technique is rapidly followed by the development and sale of generally
|
|||
|
inexpensive programs to copy or even "unprotect" the software. Once
|
|||
|
"unprotected," the software can easily be copied by most ordinary computers.
|
|||
|
|
|||
|
POINT: If our increasingly important software industry (estimated revenues:
|
|||
|
greater than $16 billion by 1986) is to remain viable, we must curb copying.
|
|||
|
If people use programs to copy copy- protected software they will inevitably
|
|||
|
begin to "share" these copies with others. We should crack down hard on people
|
|||
|
who copy such programs. We should do the same thing to those who develop and
|
|||
|
sell software to facilitate program copying. Both are engaged in activities
|
|||
|
designed to "steal" legitimate income from the software producers. Both should
|
|||
|
be treated as criminals. At the same time, software companies should be
|
|||
|
encouraged to invest more time, effort and resources to developing better
|
|||
|
techniques for protecting their programs from illicit copying. The way to
|
|||
|
solve this problem is to build better "locks," and then come down hard on those
|
|||
|
who still try to break them.
|
|||
|
|
|||
|
COUNTERPOINT: Calls for tougher enforcement and better protection techniques
|
|||
|
seek to treat symptoms of the problem rather than its underlying causes. A lot
|
|||
|
of quite legitimate users defeat copy- protection features simply because these
|
|||
|
features frustrate their ability to effectively use the program. A
|
|||
|
copy-protected program prevents the user from making a backup copy, meaning
|
|||
|
that he has to assume the risk of an accidental erasure which will cost
|
|||
|
hundreds of dollars. It also makes it difficult to run programs on machines
|
|||
|
with "hard disk" storage devices. And, copy protection prevents users with
|
|||
|
programming skills from doing otherwise perfectly legal and reasonable
|
|||
|
customizing or "patching" the program to better suit their individual purposes.
|
|||
|
Even if more restrictive laws were passed, enforcement would become a very
|
|||
|
difficult problem. Unless the policing activities expanded far beyond current
|
|||
|
levels (with attendant tax increases) it would be virtually impossible to
|
|||
|
enforce such a ban effectively. An unenforceable or unenforced law creates
|
|||
|
many potential problems. All of the emphasis on copy-protection is, in the
|
|||
|
long run, a waste of effort -- it is just another pressure to keep the software
|
|||
|
costs too high. Precisely the same software design advances that allow new
|
|||
|
copy-protection techniques, also allow for techniques to defeat the protection.
|
|||
|
Adding copy-protection creates about as much advance as does a dog chasing its
|
|||
|
tail. A lot of experts predict that, for simple economic reasons, future
|
|||
|
distribution of software programs will increasingly be accomplished through
|
|||
|
electronic communications means. To do that, by definition, requires a program
|
|||
|
that is not copy-protected; otherwise you couldn't convert it into a form that
|
|||
|
can be communicated. So the handwriting is on the wall for copy-protection as
|
|||
|
a way of ensuring income. It is time for the software industry to face
|
|||
|
reality, to stop adding protection features which limit the usefulness of their
|
|||
|
overpriced programs. Instead the industry should begin to experiment seriously
|
|||
|
with an approach called "freeware." Under this concept, now being used with
|
|||
|
apparent success by several smaller firms, programs are priced in the $10 to
|
|||
|
$50 range. The programs are not copy-protected; to the contrary, copying is
|
|||
|
encouraged. The program authors/producers simply request that each user who
|
|||
|
finds the program useful to him or her send payment for the program to the
|
|||
|
author/producers. Apparently, the "freeware" concept, which emphasizes the
|
|||
|
honesty of people rather than treating everyone as a potential crook, works.
|
|||
|
But even if it doesn't, the traditional approach doesn't work and should not be
|
|||
|
encouraged any more.
|
|||
|
|
|||
|
QUESTIONS:
|
|||
|
|
|||
|
o When you pay a lot of money for a computer program, should you be entitled
|
|||
|
to control how the program is used?
|
|||
|
|
|||
|
o Is there a difference between making your own copy of a library from
|
|||
|
copying a commercially produced program (assuming you did not steal it)?
|
|||
|
|
|||
|
o Do you think that the "freeware" concept, that relies on people's honesty,
|
|||
|
can really work?
|
|||
|
|
|||
|
o If you don't punish people who "break" copy-protections and copy programs,
|
|||
|
will you encourage even more copying?
|
|||
|
|
|||
|
o Is it important to distinguish between copying that is done to make money
|
|||
|
and that which is done for other reasons?
|
|||
|
|
|||
|
o Would it be practical to enforce laws that outlawed copying?
|
|||
|
|
|||
|
|
|||
|
REFERENCES:
|
|||
|
A Hard Stand for Software Protection, David A. Savner and
|
|||
|
Barry D. Weiss, Computerworld (In-Depth), September 26, 1983
|
|||
|
ICEE Develops Educational-Software Copying Policy, Scott
|
|||
|
Mace, Infoworld, Vol.5/No.38
|
|||
|
Software Piracy: Formulating A Plan for Protection, Joseph
|
|||
|
I. Rosenbaum, Computerworld, September 12, 1983, p. 154
|
|||
|
License To Own Computers--Projections of a Paranoid?, Alan
|
|||
|
Stein, Infoworld, Vol.5/No.40
|
|||
|
Free Software, Tom Shea, Infoworld, Vol.5/No.26, p.31
|
|||
|
|
|||
|
(Note: Please leave your thoughts -- message or uploaded comments -- on this
|
|||
|
issue on Tom Mack's RBBS, The Second Ring --- (703) 759-5049. Please address
|
|||
|
them to Terry Steichen of New Perspectives Group, Ltd.)
|
|||
|
|
|||
|
|